咨询与建议

限定检索结果

文献类型

  • 16,051 篇 期刊文献
  • 12,641 篇 会议
  • 166 册 图书

馆藏范围

  • 28,858 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,348 篇 工学
    • 9,419 篇 计算机科学与技术...
    • 7,344 篇 软件工程
    • 3,125 篇 信息与通信工程
    • 2,966 篇 电子科学与技术(可...
    • 2,743 篇 电气工程
    • 2,170 篇 光学工程
    • 1,965 篇 控制科学与工程
    • 1,957 篇 生物工程
    • 1,734 篇 生物医学工程(可授...
    • 1,400 篇 化学工程与技术
    • 1,351 篇 材料科学与工程(可...
    • 1,063 篇 机械工程
    • 1,032 篇 仪器科学与技术
    • 851 篇 动力工程及工程热...
    • 665 篇 力学(可授工学、理...
  • 13,838 篇 理学
    • 7,415 篇 物理学
    • 4,968 篇 数学
    • 2,432 篇 生物学
    • 1,883 篇 统计学(可授理学、...
    • 1,715 篇 化学
    • 936 篇 地球物理学
    • 913 篇 系统科学
  • 3,676 篇 管理学
    • 2,232 篇 管理科学与工程(可...
    • 1,487 篇 图书情报与档案管...
    • 987 篇 工商管理
  • 1,805 篇 医学
    • 1,478 篇 临床医学
    • 1,197 篇 基础医学(可授医学...
    • 746 篇 药学(可授医学、理...
    • 544 篇 公共卫生与预防医...
  • 638 篇 法学
    • 527 篇 社会学
  • 375 篇 农学
  • 358 篇 经济学
  • 299 篇 教育学
  • 118 篇 文学
  • 47 篇 军事学
  • 46 篇 艺术学
  • 6 篇 哲学
  • 6 篇 历史学

主题

  • 804 篇 computer science
  • 462 篇 deep learning
  • 308 篇 machine learning
  • 234 篇 feature extracti...
  • 216 篇 computational mo...
  • 207 篇 application soft...
  • 196 篇 computer archite...
  • 189 篇 image segmentati...
  • 182 篇 galaxies
  • 176 篇 support vector m...
  • 165 篇 accuracy
  • 164 篇 internet of thin...
  • 159 篇 training
  • 158 篇 data mining
  • 157 篇 artificial intel...
  • 146 篇 magnetic resonan...
  • 142 篇 reinforcement le...
  • 141 篇 throughput
  • 138 篇 routing
  • 135 篇 semantics

机构

  • 1,084 篇 cavendish labora...
  • 1,012 篇 department of ph...
  • 963 篇 oliver lodge lab...
  • 958 篇 physikalisches i...
  • 637 篇 university of ch...
  • 605 篇 infn laboratori ...
  • 594 篇 infn sezione di ...
  • 576 篇 infn sezione di ...
  • 575 篇 fakultät physik ...
  • 562 篇 school of physic...
  • 556 篇 infn sezione di ...
  • 517 篇 horia hulubei na...
  • 507 篇 school of physic...
  • 506 篇 iccub universita...
  • 496 篇 department of ph...
  • 493 篇 imperial college...
  • 487 篇 h.h. wills physi...
  • 484 篇 center for high ...
  • 483 篇 stfc rutherford ...
  • 478 篇 nikhef national ...

作者

  • 261 篇 barter w.
  • 250 篇 beiter a.
  • 248 篇 a. gomes
  • 245 篇 bellee v.
  • 234 篇 c. alexa
  • 231 篇 j. m. izen
  • 225 篇 c. amelung
  • 225 篇 s. chen
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 219 篇 g. spigo
  • 219 篇 brundu d.
  • 219 篇 blake t.
  • 218 篇 bowcock t.j.v.
  • 217 篇 f. siegert
  • 217 篇 j. wang
  • 209 篇 amato s.
  • 208 篇 r. ströhmer
  • 207 篇 betancourt c.

语言

  • 24,362 篇 英文
  • 4,182 篇 其他
  • 324 篇 中文
  • 22 篇 日文
  • 7 篇 德文
  • 5 篇 法文
  • 3 篇 俄文
  • 2 篇 朝鲜文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center of Computation & Technology and Department of Computer Science"
28858 条 记 录,以下是11-20 订阅
排序:
Thinking Outside of the Differential Privacy Box: A Case Study in Text Privatization with Language Model Prompting
Thinking Outside of the Differential Privacy Box: A Case Stu...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Meisenbacher, Stephen Matthes, Florian Technical University of Munich School of Computation Information and Technology Department of Computer Science Garching Germany
The field of privacy-preserving Natural Language Processing has risen in popularity, particularly at a time when concerns about privacy grow with the proliferation of Large Language Models. One solution consistently a... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2139-2159页
作者: Zaed Mahdi Nada Abdalhussien Naba Mahmood Rana Zaki Information Technology Center University of TechnologyBaghdad00964Iraq Continuous Education Center University of TechnologyBaghdad00964Iraq Computer Science Department University of TechnologyBaghdad00964Iraq
The primary concern of modern technology is cyber attacks targeting the Internet of *** it is one of the most widely used networks today and vulnerable to ***-time threats pose with modern cyber attacks that pose a gr... 详细信息
来源: 评论
rafPS:A shapley-based visual analytics approach to interpret traffic
收藏 引用
computational Visual Media 2024年 第6期10卷 1101-1119页
作者: Zezheng Feng Yifan Jiang Hongjun Wang Zipei Fan Yuxin Ma Shuang-Hua Yang Huamin Qu Xuan Song Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 18055China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyHong KongChina Department of Computer Science University of ReadingBerkshire RG66AHUK Center for Spatial Information Science the University of TokyoTokyo 113-00331Japan Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and TechnologyShenzhen 518055China
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode... 详细信息
来源: 评论
On the Integration of Privacy-Enhancing Technologies in the Process of Software Engineering  26
On the Integration of Privacy-Enhancing Technologies in the ...
收藏 引用
26th International Conference on Enterprise Information Systems, ICEIS 2024
作者: Klymenko, Alexandra Meisenbacher, Stephen Favaro, Luca Matthes, Florian Technical University of Munich TUM School of Computation Information and Technology Department of Computer Science Garching Germany
The class of technologies known as Privacy-Enhancing Technologies (PETs) has been receiving rising attention in the academic sphere. In practice, however, the adoption of such technologies remains low. Beyond the actu... 详细信息
来源: 评论
A Comparative Analysis of Word-Level Metric Differential Privacy: Benchmarking The Privacy-Utility Trade-off  30
A Comparative Analysis of Word-Level Metric Differential Pri...
收藏 引用
Joint 30th International Conference on computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Meisenbacher, Stephen Nandakumar, Nihildev Klymenko, Alexandra Matthes, Florian Technical University of Munich TUM School of Computation Information and Technology Department of Computer Science Garching Germany
The application of Differential Privacy to Natural Language Processing techniques has emerged in relevance in recent years, with an increasing number of studies published in established NLP outlets. In particular, the... 详细信息
来源: 评论
Customized Transformer Adapter with Frequency Masking for Deepfake Detection
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5904-5918页
作者: Shi, Zenan Chen, Haipeng Jia, Yixin Zhang, Dong Lu, Wei Yang, Xun Jilin University College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Jilin University College of Software Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China The Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Sun Yat-sen University School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China
The evolution of advanced artificial intelligence generated content approaches has heightened concerns about deepfake, due to the sophisticated forgeries and concealed appearances they produce. To this end, the pre-tr... 详细信息
来源: 评论
A learning automata based edge resource allocation approach for IoT-enabled smart cities
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1258-1266页
作者: Sampa Sahoo Kshira Sagar Sahoo Bibhudatta Sahoo Amir H.Gandomi Department of Computer Science and Engineering C.V.Raman Global UniversityBhubaneswarIndia Department of Computer Science and Engineering SRM UniversityAmaravatiIndia Department of Computing Science Umea UniversityUmea90187Sweden Department of Computer Science and Engineering NIT RourkelaIndia Faculty of Engineering and Information Technology University of Technology SydneyAustralia University Research and Innovation Center(EKIK) Obuda University1034 BudapestHungary
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ... 详细信息
来源: 评论
Judicial nested named entity recognition method with MRC framework
收藏 引用
International Journal of Cognitive Computing in Engineering 2023年 第1期4卷 118-126页
作者: Zhang, Hu Guo, Jiayu Wang, Yujie Zhang, Zhen Zhao, Hansen School of Computer and Information Technology Shanxi University Shanxi Taiyuan030006 China Department of Computation Science and Engineering George Institute of Technology Atlanta United States
Judicial named entity recognition (JNER) is a basic task of judicial intelligence and judicial service informatization. At present, the research of JNER has attracted extensive attention. However, the existing JNER me... 详细信息
来源: 评论
Towards Privacy in Decentralized IoT:A Blockchain-Based Dual Response DP Mechanism
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 699-717页
作者: Kai Zhang Pei-Wei Tsai Jiao Tian Wenyu Zhao Xinyi Cai Longxiang Gao Jinjun Chen Department of Computing Technologies Swinburne University of TechnologyMelbourne 3122Australia School of Computer Science and Technology Xinjiang UniversityUrumchi 830000China Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China
Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into block... 详细信息
来源: 评论